Difference between revisions of "SSH"

From Clinfowiki
Jump to: navigation, search
(Created page with "Secure Shell, or SSH, is a cryptographic (encrypted) network protocol to allow remote login and other network services to operate securely over an unsecured network <ref name=...")
 
 
Line 1: Line 1:
 
Secure Shell, or SSH, is a cryptographic (encrypted) network protocol to allow remote login and other network services to operate securely over an unsecured network <ref name="Ylonen-2006>Ylonen, T., & Lonvick, C. (2006). The secure shell (SSH) protocol architecture.</ref>.
 
Secure Shell, or SSH, is a cryptographic (encrypted) network protocol to allow remote login and other network services to operate securely over an unsecured network <ref name="Ylonen-2006>Ylonen, T., & Lonvick, C. (2006). The secure shell (SSH) protocol architecture.</ref>.
 +
 +
=Alternate Definition=
 +
 +
Secure Shell is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels. It is a replacement for rlogin, rsh, rcp, and rdist.
 +
 +
SSH protects a network from attacks such as IP spoofing, IP source routing, and DNS spoofing. An attacker who has managed to take over a network can only force ssh to disconnect. He or she cannot play back the traffic or hijack the connection when encryptions enabled.
 +
 +
When using ssh's slogin (instead of rlogin) the entire login session, including transmission of password, is encrypted; therefore it is almost impossible for an outsider to collect passwords. <ref name="Beal>Beal, V. (nd). SSH - Secure Shell.</ref>.
 +
  
 
== References ==
 
== References ==
 
<references/>
 
<references/>

Latest revision as of 12:35, 9 December 2015

Secure Shell, or SSH, is a cryptographic (encrypted) network protocol to allow remote login and other network services to operate securely over an unsecured network [1].

Alternate Definition

Secure Shell is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels. It is a replacement for rlogin, rsh, rcp, and rdist.

SSH protects a network from attacks such as IP spoofing, IP source routing, and DNS spoofing. An attacker who has managed to take over a network can only force ssh to disconnect. He or she cannot play back the traffic or hijack the connection when encryptions enabled.

When using ssh's slogin (instead of rlogin) the entire login session, including transmission of password, is encrypted; therefore it is almost impossible for an outsider to collect passwords. [2].


References

  1. Ylonen, T., & Lonvick, C. (2006). The secure shell (SSH) protocol architecture.
  2. Beal, V. (nd). SSH - Secure Shell.